Mukesh Kumar, Dr. Kamlesh Singh, M. Kannan, Rajiv Kumar, Naveen Rana
{"title":"Work-In-Process (Wip) Control by Lean and Agile Manufacturing","authors":"Mukesh Kumar, Dr. Kamlesh Singh, M. Kannan, Rajiv Kumar, Naveen Rana","doi":"10.1109/icfirtp56122.2022.10059427","DOIUrl":"https://doi.org/10.1109/icfirtp56122.2022.10059427","url":null,"abstract":"To turn into an elite association, the fundamental necessities of any assembling organization are Process duration decrease, lower fabricating cost and insignificant stock. To contend in the computerized, the lean and spry assembling assume an imperative part to elevate the creation cycle. Lean assembling focus on the worth expansion by disposing of the tedious, invalid esteemed processes in the assembling cycle. Spry assembling upholds streamlining, normalization and mechanization of the improvement processes. The motivation behind Lean and light-footed assembling is the consumer loyalty with a practical cost. The job of lean and lithe assembling is fundamental to keep up with the ideal work in process stock in the creation stream. In the current work, the idea of lean and nimble assembling is appliedin the kettle part creation work, where the point is to decide the variables influencing the Work-In-Cycle (WIP) stock levels to satisfy the necessary need for every item. The choice factors are distinguished and their belongings are dissected. The investigation is centered on underlying driver of the issue, key issues related with the frameworks, execution of Kanban, stock expense, reorder point and so forth. The work gives techniques to limit the all out WIP stock across all components of the kettle part.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121188729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shalini Singh, C. Sharma, S. Agarwal, Umang Garg, Neha Gupta
{"title":"The Detection and Analysis of Fake News Using Machine Learning","authors":"Shalini Singh, C. Sharma, S. Agarwal, Umang Garg, Neha Gupta","doi":"10.1109/ICFIRTP56122.2022.10063208","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10063208","url":null,"abstract":"Social media has become one of the hotbeds for the dissemination of fake news in the market. Although, the role of social media is very important for the campaign, broadcaster of any news, and trend formulation. However, it may be the reason for the dissemination of fake news and bring negative impactual results on society and individuals. Even some significant impacts on election campaigns, politics, trend settings, and marketing agencies can be executed using social media. So the detection of fake news is one of the most perpetual ways to set the right trend in the market. Traditional methods with manual filtering are not feasible for the detection of fake news effectively. Although, there are several techniques used to detect fake news such as data mining, natural language processing, social network analysis, and machine learning algorithms. In this paper, the focus is to detect false news using distinctive machine learning algorithms. The model is trained and tested of the data-set available freely as an open-source. The positive prediction rate is very high in the ROC curve indicates the prediction of fake news effectively. Our experiment indicates the high accuracy with the support vector machine classifier algorithm.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124369467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Evaluation of Sentiment Analysis Techniques, Processes and Challenges","authors":"Er. Vishal Vig, Vivek Kumar, Er. Mohita Trehan, Er. Rishi Sharma","doi":"10.1109/ICFIRTP56122.2022.10059420","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059420","url":null,"abstract":"Sentiment analysis is a technique that is occasionally used to examine information in textual form and extract thoughts from the text. The goal of sentiment analysis is to determine if users have a good or negative impression about a given topic. Online communication platforms like Twitter, Facebook, YouTube, and others have become quite important in modern society. People discuss their feelings or ideas on it. We tend to emphasise on opinion mining or feeling evaluation in this review paper, which is a field of web data mining and machine learning. The evaluation of several methodologies has been done in this study, which presents the machine learning and natural language processing (NLP) methods employed by earlier academics in sentiment analysis.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125981823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face mask detection using transfer learning and OpenCV in live videos","authors":"Himanshu Gupta, Chandni Sharma","doi":"10.1109/ICFIRTP56122.2022.10059441","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059441","url":null,"abstract":"In 2019, we have seen the biggest epidemic of the century, which claimed many lives worldwide. The epidemic has in fact changed our life in many ways. It changed the way we interact with people. Wearing a mask is now the new normal. Though now the vaccine for the disease is available, still wearing a mask can save us from Covid19, its variants, and other contagious diseases.Especially at places where the large gathering is expected wearing a mask can be made mandatory and our proposed framework can do its monitoring through CCTV cameras.So in this research, we build a deep learning-based framework to detect whether some person is wearing a mask or not through the live video stream. We used a total of three state-of-the-art transfer learning methods to train our system and used OpenCV to detect faces in the live video stream. We found that efficientnetB1 achieved the highest accuracy of 97.75%.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"40 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132182369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Machine Learning Model to Predict Student Academics Course Interest","authors":"K. Pal, Chunnu Lal, Abhishant Sharma","doi":"10.1109/ICFIRTP56122.2022.10059414","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059414","url":null,"abstract":"In the present study, we have put forth a machine learning classifier-based model for predicting if a student’s academic course interest is appropriate. Our demands are growing and have no boundaries as a result of the impending arrival of modern technologies. A lot of research is being done today in the area of data classification and prediction. The rate of progression has always increased and has been exponential. In the modern era, data processing is one of the most important and diverse fields of study, and it has a wide range of applications. We all understand that machine learning will be replaced by AI in the future. An important component of it is deep learning. Data classification in many classes is the most common type. Therefore, we trained a machine learning classifier using current data and a variety of recommended methods and algorithms based on various variables. Researchers are working to increase the accuracy of Students predictions based on abilities that are evaluated using a variety of criteria. In order to determine which model is ideal for categorizing the data, we looked through the numerous options. To determine the optimal model, we compare the various output parameters as well.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132267076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Surendra Kumar Shukla, Kireet Joshi, Gagan Deep Singh, Ankur Dumka
{"title":"Stock Market Prediction Using Deep Learning","authors":"Surendra Kumar Shukla, Kireet Joshi, Gagan Deep Singh, Ankur Dumka","doi":"10.1109/ICFIRTP56122.2022.10059433","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059433","url":null,"abstract":"World's economy is driven by the stock market. Investors want to gain a reasonable profit by putting their valuable wealth in suitable stocks thus residing in a secure and win-win situation. Stock market movement is a critical concern which decides the profit or loss for the customers. Fundamental behind market movement is identified as time series. Thus, time series prediction could insist investors to design a suitable strategy during the investments to overcome the risk of erroneous investments. Therefore, a LSTM based model which works with the principle of time series has been adopted in this research work to predict stock prices. Furthermore, recurrent oriented Short-Term Long Memory (LSTM) algorithm has been developed and is employed for predicting the stock price of a company based on the historical prices available. And, next 30 days stocks were predicted. The proposed algorithm is verified with the Apple stock data (AAPL). The obtained results are analyzed through training RMSE (root mean squared error) and the test RMSE. Compared to the related stock prediction approaches, the proposed LSTM based algorithm performs better than its counterparts and shows definite accuracy in predicting the stock prices.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122571486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICFIRTP 2022 Cover Page","authors":"","doi":"10.1109/icfirtp56122.2022.10059455","DOIUrl":"https://doi.org/10.1109/icfirtp56122.2022.10059455","url":null,"abstract":"","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122035770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Allocation of Bandwidth & Congestion Avoidance during Data Flow","authors":"Y.N. Prajapati, Pranob Adhikari","doi":"10.1109/ICFIRTP56122.2022.10059436","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059436","url":null,"abstract":"Today’s internet sender-to-receiver congestion control is crucial for scalability and robustness, but it’s important to note that the end-to-end algorithms are plagued by two distinct types of issues. The first is the potential for congestion collapse, and the second is the inequitable distribution of bandwidth among various applications. We propose and study a novel congestion avoidance technique called Network Border Patrol The feedback exchange between the routers that are located at the beginning and conclusion of the data exchange is this situation’s primary functionality. Here, the starting point router’s buffer scheme is also being used effectively. Simulated data is used to study effective bandwidth allocation and congestion avoidance during data flow. The effective transfer of preventing them from loss and discarding will be made possible by this method. By exchanging feedback with edge routers, it will monitor the packet flow rate.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117344491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis on Amazon Dataset using Transfer learning","authors":"Pundreekaksha Sharma, Pritosh Tomar, Debajyoti Mukherjee","doi":"10.1109/ICFIRTP56122.2022.10059413","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059413","url":null,"abstract":"In this paper, we have proposed several Machine Learning, Deep Learning and Transfer Learning model which is totally based upon new cutting-edge technology i.e., Sentiment analysis. With the continuous growth in the technology field Artificial Intelligence is on its way to change the motive of technology. So, this project is not only applicable for the above-mentioned dataset but it’s applicable for every dataset which consists of customer review. We all know that after the corona wave every market is switching into Online mode. There are a numerous number of website or company that are using customer sentiment technique to get the insight about their thought for particular product. In our project we use Classification technique to identify whether the sentiment for the particular product is positive or negative. So, based upon the existing dataset we follow the proper NLP pipeline so that we can extract all the features and get a clean dataset. ML and DL has huge algorithm support so using different classification algorithm we apply the NLP vectorization technique. Above all we also apply transfer learning model that is built on the top of Deep Learning model, which enhance the accuracy of the model because it’s developed on pre-built model. The ultimate goal for a developer is to get best accuracy, precision, recall and F1 Score. So, judging on the above-mentioned parameter and on behalf of industrial sight we compare different model and try to prove which model is the best model for this particular task.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129997290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review Paper on IDS in Edge Computing or EoT","authors":"Reshoo Devi, Amit Kumar, Vivek Kumar, Ashish Saini, Amrita Kumari, Vipin Kumar","doi":"10.1109/ICFIRTP56122.2022.10059442","DOIUrl":"https://doi.org/10.1109/ICFIRTP56122.2022.10059442","url":null,"abstract":"The main intention of edge computing is to improve network performance by storing and computing data at the edge of the network near the end user. However, its rapid development largely ignores security threats in large-scale computing platforms and their capable applications. Therefore, Security and privacy are crucial need for edge computing and edge computing based environment. Security vulnerabilities in edge computing systems lead to security threats affecting edge computing networks. Therefore, there is a basic need for an intrusion detection system (IDS) designed for edge computing to mitigate security attacks. Due to recent attacks, traditional algorithms may not be possibility for edge computing. This article outlines the latest IDS designed for edge computing and focuses on the corresponding methods, functions and mechanisms. This review also provides deep understanding of emerging security attacks in edge computing. This article proves that although the design and implementation of edge computing IDS have been studied previously, the development of efficient, reliable and powerful IDS for edge computing systems is still a crucial task. At the end of the review, the IDS developed will be introduced as a future prospect.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123773061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}